System types in a deployment

A typical deployment ISAM involves the installation of a number of systems. All deployments include several types ISAM systems that are set up in a secure domain, including:

Each system type has software prerequisites that include Security Verify Access components. We must successfully configure both the prerequisites and Security Verify Access components to avoid operational problems in the environment. For example, the ISAM policy server requires installation of the following components:

Parent topic: Verify the deployment